Malware Repository 2018
β41Jan 23, 2024Updated 2 years ago
Alternatives and similar repositories for 2018-Malware-Repository
Users that are interested in 2018-Malware-Repository are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- it is a trojan at least, half of it is π See Readmeβ10Feb 26, 2021Updated 5 years ago
- There are many powerful viruses π that can damage your PC in a matter of seconds. Batch file virus to gain full access to another computβ¦β51Mar 7, 2021Updated 5 years ago
- Fully undetectable bypass for every antivirus (FUD at the moment). Works by downloading a bat file that adds an exclusion for exe files, β¦β40Feb 12, 2023Updated 3 years ago
- A C2 project that controls a self-propagating MS17-010 worm.β77Jun 18, 2021Updated 4 years ago
- Community driven computer wormβ71Aug 15, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.β43Apr 22, 2018Updated 7 years ago
- A crypter/dropper to bypass static (and dynamic) analysis.β15Nov 11, 2022Updated 3 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)β15Mar 10, 2017Updated 9 years ago
- β16Jan 9, 2023Updated 3 years ago
- Android mobile software repair toolβ12Mar 11, 2018Updated 8 years ago
- List of all Memcached Servers that are vulnerable to DDoS attack vectorβ10Dec 21, 2020Updated 5 years ago
- some python3 functions to add spreading features to any python backdoorβ56Jan 22, 2017Updated 9 years ago
- Minecraft bot for protecting players.β19Aug 14, 2024Updated last year
- Scan suspicious applications with over 60 different anti-viruses with a mere two clicks and five seconds!β40Feb 24, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This Python-based DDoS tool for Termux enables stress testing with TCP, UDP, HTTP, and HTTPS flood attacks, featuring domain resolution, β¦β18Nov 10, 2024Updated last year
- Malicious Software SRC Extractβ32Jan 2, 2023Updated 3 years ago
- A WHATSAPP deleted messages recovery app based on MVVM architecture + Repository Pattern + Room + KOIN + RxJava2 + Databinding + Navigatβ¦β14Apr 28, 2020Updated 5 years ago
- Exploit Pack - One step aheadβ12Sep 9, 2013Updated 12 years ago
- This script can crash ,whatsapp,hike , facebook and any other social chatting siteβ24Feb 21, 2019Updated 7 years ago
- A collection of open source and commercial tools that aid in red team operations.β10Jun 12, 2019Updated 6 years ago
- Using Microsoft Office Password Cracker tool we can unlock any Microsoft Office file.This tool is using john tool. wordlist generator isβ¦β15Aug 28, 2022Updated 3 years ago
- Internet Explorer Organization Pageβ23Oct 31, 2018Updated 7 years ago
- DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained without Shodan APIβ22Mar 11, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Automated Password Cracking Toolβ17Dec 19, 2020Updated 5 years ago
- PS3 .sprx how to bypass authentication using another .sprxβ10Feb 15, 2021Updated 5 years ago
- Here I provide the steps and files needed in order to pull IPS from Discord! You can also pull anyones IP no matter what app you are usinβ¦β16Aug 13, 2020Updated 5 years ago
- User space network intercepting libraryβ18Jun 10, 2021Updated 4 years ago
- dead-simple blog template powered by Markdown and PHPβ10May 6, 2025Updated 11 months ago
- Cross-platform process dependency monitor with GUIβ10Feb 23, 2026Updated last month
- ΩΨΊΨ© Ψ§ΩΨ¨Ψ±Ω Ψ¬Ψ© ΨΉΩ ΩΨ±ΩΨ§β11Jul 17, 2021Updated 4 years ago
- make virus without codingβ12Apr 7, 2020Updated 6 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.β26May 1, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- DDoS Scripts for booters, Dedis and whatever.β20Jun 28, 2015Updated 10 years ago
- HTTP based framework for building command and control components for remote access trojansβ15Aug 2, 2021Updated 4 years ago
- [Phishing Tool]β17Jul 18, 2025Updated 8 months ago
- Unlimited subscription to the Ulysses app on iOS and macOSβ23Sep 3, 2022Updated 3 years ago
- Tools for SMF: useful scripts, install/repair and others.β22Sep 5, 2023Updated 2 years ago
- β25Jan 31, 2026Updated 2 months ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous β¦β44Sep 29, 2017Updated 8 years ago